[Forgot Password]
Login  Register Subscribe

23631

 
 

115084

 
 

97147

 
 

909

 
 

78730

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2016-2108

Date: (C)2016-06-02   (M)2017-11-17 


The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the "negative zero" issue.

CVSS Score: 10.0Access Vector: NETWORK
Exploit Score: 10.0Access Complexity: LOW
Impact Score: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE





Reference:
SECTRACK-1035721
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl
BID-89752
BID-91787
APPLE-SA-2016-07-18-1
DSA-3566
FEDORA-2016-05c567df1a
FEDORA-2016-1411324654
FEDORA-2016-1e39d934ed
GLSA-201612-16
RHSA-2016:0722
RHSA-2016:0996
RHSA-2016:1137
SSA:2016-124-01
SUSE-SU-2016:1206
SUSE-SU-2016:1228
SUSE-SU-2016:1231
SUSE-SU-2016:1233
SUSE-SU-2016:1267
SUSE-SU-2016:1290
SUSE-SU-2016:1360
USN-2959-1
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html
http://source.android.com/security/bulletin/2016-07-01.html
http://support.citrix.com/article/CTX212736
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
https://bto.bluecoat.com/security-advisory/sa123
https://git.openssl.org/?p=openssl.git;a=commit;h=3661bb4e7934668bd99ca777ea8b30eedfafa871
https://git.openssl.org/?p=openssl.git;a=commit;h=f5da52e308a6aeea6d5f3df98c4da295d7e9cc27
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03726en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05149345
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00067&languageid=en-fr
https://security.netapp.com/advisory/ntap-20160504-0001/
https://support.apple.com/HT206903
https://www.openssl.org/news/secadv/20160503.txt
https://www.tenable.com/security/tns-2016-18
openSUSE-SU-2016:1237
openSUSE-SU-2016:1238
openSUSE-SU-2016:1239
openSUSE-SU-2016:1240
openSUSE-SU-2016:1241
openSUSE-SU-2016:1242
openSUSE-SU-2016:1243
openSUSE-SU-2016:1273

CPE    37
cpe:/a:openssl:openssl:1.0.2a
cpe:/a:openssl:openssl:1.0.2
cpe:/o:google:android:4.3.1
cpe:/o:google:android:4.1.2
...
CWE    1
CWE-119
OVAL    22
oval:org.secpod.oval:def:110488
oval:org.secpod.oval:def:204130
oval:org.secpod.oval:def:1501454
oval:org.secpod.oval:def:400786
...

© 2013 SecPod Technologies